Wells Fargo & Co, which is more famous for its stage coach service and dealing with Injuns, is the latest bank to suffer problems with its website amid heightened concerns about cyber attacks against U.S. financial institutions.

The company is the fourth-largest US bank by assets and is telling the world that some of its customers experienced intermittent access issues on Tuesday. The bank said it was working to quickly resolve the issues, a spokeswoman said, declining to comment on the source of the problem.

Wells Fargo's problems came the same day that an unidentified person on the Internet called on "cyberspace workers" to attack the bank's site. In a posting on pastebin.com, the person also warned of attacks later this week against U.S. Bancorp and PNC Financial Services Group Inc.

A similar posting last week made threats against Bank of America and the New York Stock Exchange. Apparently the attacks are motivated by Muslims angered by the anti-Mohamed flick.

Senator Joseph Lieberman, chairman of the Senate's Homeland Security and Governmental Affairs Committee, said Iran was behind the attacks. Iranian hackers have repeatedly attacked Bank of America, JPMorgan and Citigroup Inc over the past year as part of a broad cyber campaign targeting the United States, according to people familiar with the situation.

A flaw in some 64-bit operating systems and virtualization software programs are vulnerable to local privilege escalation attacks.

The problem only happens when running on Intel processors, the US Computer Emergency Readiness Team (US-CERT) announced today. The hole, dubbed CVE-2012-0217, stems from the way Intel CPUs have implemented the SYSRET instruction in their x86-64 extension, known as Intel 64.

Crackers could exploit the vulnerability to force Intel CPUs to return a general protection fault in privileged mode. This would give them power to execute code with kernel privileges from a least-privileged account, or to escape from a virtual machine and gain control of the host operating system.

The vulnerability can only be exploited on Intel CPUs when the Intel 64 extension is in use. Some of the operating systems confirmed as vulnerable so far include x64-based versions of Windows 7 and Windows Server 2008 R2, the 64-bit versions of FreeBSD and NetBSD, the Xen virtualisation software, as well as Red Hat Enterprise Linux and SUSE Linux Enterprise Server.

Insurgents working for Hamas have fired rockets on Kiryat Gat, home to a huge Intel factory.

No one was injured, and the Israeli defence force retaliated with an aerial strike. One of the missiles exploded at a cattle barn outside of the city.

Kiryat Gat is halfway between Be’er Sheva, the capital of the Negev, and Rehovot, the southern edge of metropolitan Tel Aviv. Hamas left Kiryat Gat alone since Israel’s counterterrorist Operation Cast Lead campaign two and a half years ago.

Another rocket exploded between Ashkelon and Kiryat Gat. Hamas has increased the number of its rocket attacks in the past month, attacking Israel with four times the number of missiles than it did in June.

However managing to hit a high profile target like the huge Intel plant might get the insurgents some attention. Fortunately they have not sorted out that targeting problem yet.

As China was accused of mounting a five-year hacking operation in which industrial and national secrets were stolen on an unprecedented scale, software giant Microsoft started a contest aimed at turning the tables on hackers. Microsoft's plans, launched at a computer security conference in Las Vegas, include prizes for innovative tactics to foil cyber attacks.

Dubbed the BlueHat Prize, Microsoft will reward research that defends against entire types of cyber attacks. The downside is that the scheme will replace ''bounties'' for those who discover individual computer bugs in Microsoft software.

Redmond hopes that if enough people stick brain power into solving system problems they will make it too hard for hackers to take down systems. We would suspect that anyone who can come up with a system that defeats denial of service attacks should be given a lot of dosh, a knighthood and two week's sex with a celebrity of their choice.

South Korea is furious that the personal information of about 35 million of its Internet users were stolen in a hacking attack that originated in China. Normally South Korea has to worry about hack attacks from the North, but this time it does not think that “Dear Leader” has been on his computer console hacking them.

Internet and social media sites Nate and Cyworld were hit with the hackers looking for social security numbers and email addresses. According to the Korea Communications Commission the operator of the sites, SK Communications, alleged the attack originated from computers in China based on their Internet Protocol addresses.

For once it also does not seem to be a state sponsored attack either. Governments are not usually interested in the user IDs, passwords, social security numbers, names, mobile phone numbers and email addresses of the great unwashed. It is more likely Chinese criminal gangs who want to use the information for Phishing attacks.

According to NPR the attack would be the largest Internet hacking case to have taken place in South Korea.

Anonymous is threatening to bring down the UK judiciary and the Metropolitan police's computer systems today. Apparently this is in response to News International's phone hacking scandal and at the extradition proceedings against WikiLeaks founder Julian Assange.

A Twitter feed purporting to belong to Sabu, a senior figure within the group and the founder of the spin-off group LulzSec, which hacked a site linked to the CIA and the UK's Serious Organised Crime Agency, promised two releases of information would be launched within a day. A follow-up message read: "ATTN Intelligence community: Your contractors have failed you. Tomorrow is the beginning."

Chat channels has suggested several top-level members of Anonymous are eager to launch attacks based around Julian Assange's appeal hearing against extradition, which begins today. There are rumours that an Anonymous member had broken into the News International servers and taken copies of some internal emails which were being offered for sale.

Apparently, hacker group Anonymous hacked into Apple’s servers on Sunday, snatching a list of admins and passwords from the company's survey sites's MySQL table.

However, Anonymous’ twitter feed says that they weren’t so serious and that there’s no reason for worry as they’re busy elsewhere. The group did concede though that Apple may be one of the targets in its AntiSec initiative.

LulzSec latest wave of attacks split internet users as over half admit they find LulzSec internet attacks amusing. A post to LulzSec's Twitter feed confirmed the outfit's participation in the attack on the CIA website yesterday, and is one of a long catalogue of attacks in the last few weeks by LulzSec.

LulzSec claims to be exposing security vulnerabilities in websites and organisations for "fun", but a poll conducted yesterday by Sophos discovered that internet users are divided in opinion. Namely, 43 percent say hacking into companies is no laughing matter, whereas over 50 percent find some amusement in the hacks.

Graham Cluley, senior technology consultant at Sophos said that while some people think this is a fun game that can also help point out corporate security weaknesses, the truth is that companies and innocent customers are having their personal data exposed. He said that there was a responsible way to inform a business that its website is insecure, or that it has not properly protected its data. He finds it disturbing is that so many internet users appear to support LulzSec.

Crucially, a denial of service attack - like that which appears to have hit the CIA website - is against the law. You have to ask yourself if LulzSec has finally bitten off more than it can chew. After all, they've just poked a very grizzly bear with a pointy stick. LulzSec's cockiness may be their undoing," added Cluley.

Citigroup has finally admitted that a cyber attack in May affected over 360,000 of its customers. This is twice the initial number that the bank's figures had suggested and follows pressure to release more details about the hack.

Citigroup is the third largest US bank. The breach, which Citigroup first made public on June 8, was initially detected on May 10.

More than 360,080 North American Citigroup credit card accounts were affected by the breach, the bank said. This is only one percent of North American card customers had been affected.

But the bank's annual report says that number of customers totals 21 million, which initially indicated that about 200,000, rather than over 360,000, customers had been affected. Citigroup reissued credit cards to 217,657 accounts along with a notification letter.

A few weeks after the US announced that hacking its servers could be seen as a declaration of war, a European group of hackers took out the US Senate computer server.

LulzSec, a hacker activist group made up of former members of the hacker organization Anonymous, said it had also broken into the networks of Bethesda Softworks and released sign-ons and passwords of users of a pornography website.

The hack follows more than two weeks of cyber attacks by the group, which claims PBS, the television network Fox, and the Atlanta chapter of a U.S. Federal Bureau of Investigation affiliate called InfraGuard for its scalps. On their webpage the hackers said that they didn't like the U.S. government very much.

Martina Bradford, deputy sergeant-at-arms of the U.S. Senate, said the hackers did not gain access into the Senate computer network and was only able to read and determine the directory structure of the file placed on senate.gov. However the Senate data, known as a configuration file, could be used by other hackers to exploit vulnerabilities in the Senate network and obtain confidential information from U.S. Lawmakers.